Preview

Cissp Study Guide

Powerful Essays
Open Document
Open Document
67651 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cissp Study Guide
ISC CISSP

ISC CISSP Certified Information Systems Security Professional

Practice Test
Version

ISC CISSP: Practice Exam QUESTION NO: 1 All of the following are basic components of a security policy EXCEPT the A. definition of the issue and statement of relevant terms. B. statement of roles and responsibilities C. statement of applicability and compliance requirements. D. statement of performance of characteristics and requirements. Answer: D Explanation: Policies are considered the first and highest level of documentation, from which the lower level elements of standards, procedures, and guidelines flow. This order , however, does not mean that policies are more important than the lower elements. These higher-level policies, which are the more general policies and statements, should be created first in the process for strategic reasons, and then the more tactical elements can follow . -Ronald Krutz The CISSP PREP Guide (gold edition) pg 13

A security policy would include all of the following EXCEPT A. Background B. Scope statement C. Audit requirements D. Enforcement Answer: B

QUESTION NO: 3

Which one of the following is an important characteristic of an information security policy? A. Identifies major functional areas of information. B. Quantifies the effect of the loss of the information. C. Requires the identification of information owners. D. Lists applications that support the business function. Answer: A Explanation: Information security policies area high-level plans that describe the goals of the procedures. Policies are not guidelines or standards, nor are they procedures or controls. Policies describe "Pass Any Exam. Any Time." -
Ac

tua

lTe

sts

QUESTION NO: 2

.co

m

2

ISC CISSP: Practice Exam security in general terms, not specifics. They provide the blueprints for an overall security program just as a specification defines your next product - Roberta Bragg CISSP Certification Training Guide (que) pg 206

You May Also Find These Documents Helpful

  • Satisfactory Essays

    b. CISSP certification is for someone who many years of experience in the InfoSec industry. Typically someone who is CISSP certified will manage a team of SSCP’s. CISSP’s are responsible for the InfoSec throughout the entire organization. They see to it that all…

    • 814 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1) Which of the following is the best description of the defense in depth strategy? B) Using multiple layers of security controls to protect resources.…

    • 284 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    IS3220 Final Exam

    • 700 Words
    • 4 Pages

    7. Personnel should be authenticated and authorized prior to being granted access to company’s information resources. This statement is an example of ________________?…

    • 700 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    It255 Final Study Guide

    • 843 Words
    • 4 Pages

    17. Which of the following is not a part of an ordinary IT security policy framework?…

    • 843 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Cis 110 Exam 1 Study Guide

    • 3983 Words
    • 16 Pages

    The paragraph mark (¶) as shown in the accompanying figure is a formatting mark that indicates where the _____ was pressed.…

    • 3983 Words
    • 16 Pages
    Satisfactory Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Olzak, T. & Bunter, B. (2010, May 07). Security basics - components of security policies. Bright…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    internal and external users to whom access to the organization’s network, data or other sensitive…

    • 3990 Words
    • 15 Pages
    Good Essays
  • Good Essays

    Unit 4 P6

    • 757 Words
    • 4 Pages

    To make sure that information is managed appropriately, a number of policies and procedures have to be put in place, concerning security of information.…

    • 757 Words
    • 4 Pages
    Good Essays
  • Good Essays

    1. Identify the touch points between the objectives and requirements of PCI DSS and YieldMore’s IT environment.…

    • 619 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Chapter 13 Quiz

    • 1169 Words
    • 5 Pages

    16. Congress's role in national security policy has typically included all of the following EXCEPT…

    • 1169 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Est1 Task 1

    • 623 Words
    • 3 Pages

    The security rule has meaningful standards that are grouped into five categories; administrative safeguard, physical safeguard, technical standards, organizational standards, and policies, procedures, and documentation requirements. Administrative safeguards have several standards that help implement the security rule. The security operation purpose require organizations to evaluate their risks to security and implement policies and procedures that prohibit, detect, and acceptable security violations and to define appropriate approval for security violations. Another, workforce security has three implementation qualifications that are mandatory by the organizations. The organization has to contain policies and procedures to ensure that each members of the particular…

    • 623 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Refer to the handout Testing and Monitoring Security Controls. It contains information on security events or breaches and baseline anomalies.…

    • 1066 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Defining policies for every domain of an IT infrastructure breaks down in depth how each entity should be properly used. The policies should also identify the key players that will play a key role in ensuring optimum use of all devices, as well as establishing and maintaining security throughout the process of information traveling through the Infrastructure. Here are some best practices to keep in mind when defining policies for a few of the domains within the infrastructure:…

    • 545 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Test 1 Study Guide CISS 250

    • 3236 Words
    • 32 Pages

    A supply chain management is an enterprise application because the systems that support each business process:…

    • 3236 Words
    • 32 Pages
    Satisfactory Essays